Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
aol instant messenger 4.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-0591
Directory traversal vulnerability in AOL Instant Messenger (AIM) 4.8 beta and previous versions allows remote malicious users to create arbitrary files and execute commands via a Direct Connection with an IMG tag with a SRC attribute that specifies the target filename.
Aol Instant Messenger 4.1
Aol Instant Messenger 4.6
Aol Instant Messenger 4.8 Beta
Aol Instant Messenger 4.2
Aol Instant Messenger 4.3
Aol Instant Messenger 4.4
Aol Instant Messenger 4.5
Aol Instant Messenger 4.0
Aol Instant Messenger 4.7
1 EDB exploit
NA
CVE-2002-0785
AOL Instant Messenger (AIM) allows remote malicious users to cause a denial of service (crash) via an "AddBuddy" link with the ScreenName parameter set to a large number of comma-separated values, possibly triggering a buffer overflow.
Aol Instant Messenger 4.1
Aol Instant Messenger 4.1.2010
Aol Instant Messenger 4.2
Aol Instant Messenger 4.2.1193
Aol Instant Messenger 4.0
Aol Instant Messenger 4.3
Aol Instant Messenger 4.4
Aol Instant Messenger 4.6
Aol Instant Messenger 4.7
Aol Instant Messenger 4.7.2480
Aol Instant Messenger 4.8.2616
Aol Instant Messenger 4.3.2229
Aol Instant Messenger 4.5
Aol Instant Messenger 4.8.2646
NA
CVE-2001-1419
AOL Instant Messenger (AIM) 4.7.2480 and previous versions allows remote malicious users to cause a denial of service (application crash) via an instant message that contains a large amount of "<!--" HTML comments.
Aol Instant Messenger 4.0
Aol Instant Messenger 4.6
Aol Instant Messenger 4.7
Aol Instant Messenger 4.3
Aol Instant Messenger 4.3.2229
Aol Instant Messenger 4.1
Aol Instant Messenger 4.2
Aol Instant Messenger 4.7.2480
Cerulean Studios Trillian 0.6351
Aol Instant Messenger 4.4
Aol Instant Messenger 4.5
NA
CVE-2002-0592
AOL Instant Messenger (AIM) allows remote malicious users to steal files that are being transferred to other clients by connecting to port 4443 (Direct Connection) or port 5190 (file transfer) before the intended user.
Aol Instant Messenger 3.0.1415
Aol Instant Messenger 3.0.1470
Aol Instant Messenger 4.1
Aol Instant Messenger 4.1.2010
Aol Instant Messenger 2.0.912
Aol Instant Messenger 3.0 N
Aol Instant Messenger 3.5.1635
Aol Instant Messenger 4.2
Aol Instant Messenger 4.2.1193
Aol Instant Messenger 4.7.2480
Aol Instant Messenger 4.8.2616
Aol Instant Messenger 4.8.2646
Aol Instant Messenger 4.6
Aol Instant Messenger 4.7
Aol Instant Messenger 2.5.1366
Aol Instant Messenger 2.5.1598
Aol Instant Messenger 3.5.1856
Aol Instant Messenger 4.0
Aol Instant Messenger 4.4
Aol Instant Messenger 4.5
Aol Instant Messenger 2.0.996
Aol Instant Messenger 2.0 N
NA
CVE-2005-1655
AOL Instant Messenger 5.5.x and previous versions allows remote malicious users to cause a denial of service (client crash) via an invalid smiley icon location in the sml parameter of a font tag.
Aol Instant Messenger 2.0.912
Aol Instant Messenger 2.5.1598
Aol Instant Messenger 3.0.1470
Aol Instant Messenger 4.1
Aol Instant Messenger 4.2
Aol Instant Messenger 4.7
Aol Instant Messenger 4.8.2616
Aol Instant Messenger 5.2.3292
Aol Instant Messenger 5.5.3415 Beta
Aol Instant Messenger 2.0.996
Aol Instant Messenger 2.0 N
Aol Instant Messenger 2.1.1236
Aol Instant Messenger 2.5.1366
Aol Instant Messenger 4.3
Aol Instant Messenger 4.3.2229
Aol Instant Messenger 4.4
Aol Instant Messenger 4.5
Aol Instant Messenger 5.9.3702
Aol Instant Messenger 1.2
Aol Instant Messenger 3.0.1415
Aol Instant Messenger 3.0 N
Aol Instant Messenger 4.0
1 EDB exploit
NA
CVE-2002-0362
Buffer overflow in AOL Instant Messenger (AIM) 4.2 and later allows remote malicious users to execute arbitrary code via a long AddExternalApp request and a TLV type greater than 0x2711.
Aol Instant Messenger 4.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started